Security policy of network messages based on SOAP

被引:0
|
作者
Zhang, Gong-Xuan [1 ]
Song, Bin [1 ]
Wang, Ping-Li [1 ]
机构
[1] School of Computer Science and Technology, NUST, Nanjing 210094, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:66 / 70
相关论文
共 50 条
  • [1] A Design Pattern for Event-Based Processing of Security-enriched SOAP Messages
    Gruschka, Nils
    Jensen, Meiko
    Lo Iacono, Luigi
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 410 - 415
  • [2] Assessment of Network Security Policy Based on Security Capability
    Tang, Chenghua
    Yu, Shunzheng
    [J]. 2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1204 - 1208
  • [3] Intelligent Security Cycle: A Rule Based Run Time Malicious Code Detection Technique for SOAP Messages
    Mohsin, Ahmad
    Asghar, Sundas
    Naeem, Tariq
    [J]. PROCEEDINGS OF THE 2016 19TH INTERNATIONAL MULTI-TOPIC CONFERENCE (INMIC), 2016, : 36 - 45
  • [4] Security Protection using Simple Object Access Protocol (SOAP) Messages Techniques
    Waleed, Ghossoon M.
    Ahmad, R. Badlishah
    [J]. ICED: 2008 INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN, VOLS 1 AND 2, 2008, : 437 - 442
  • [5] Limitations of Web Service Security on SOAP Messages in a Document Production Workflow Environment
    Sinha, Smriti Kumar
    Sinha, Subrata
    [J]. ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 342 - +
  • [6] Design of network security policy information model for policy-based network management
    Sohn, SG
    Kim, J
    Na, JC
    [J]. 7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 701 - 705
  • [7] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [8] An Automata-based Security Policy Translation for Network Security Functions
    Yang, Jinhyuk
    Jeong, Jaehoon
    [J]. 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 268 - 272
  • [9] Design of a LDAP schema based on network security policy information model for storing security policy
    Kim, G
    Na, JC
    Sohn, S
    [J]. SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 373 - 377
  • [10] From security policy to practice: Sending the right messages
    Chipperfield, Caroline
    Furnell, Steven
    [J]. Computer Fraud and Security, 2010, 2010 (03): : 13 - 19